Exam Details
Subject | Digital forensics | |
Paper | ||
Exam / Course | PGDFSTYDM)/ P.G. DIPLOMA IN INFORMATION SECURITY (PGDIS) | |
Department | School of Vocational Education and Training (SOVET) | |
Organization | indira gandhi national open university | |
Position | ||
Exam Date | December, 2015 | |
City, State | new delhi, |
Question Paper
1. In involves the investigation of data that can be retrieved from the hard disk or other disks of a computer by applying scientific methods to retrieve data.
2. In microsoft file structure, sectors are rounded together to form
3. The refers to handing over the results of private investigations to the authorities because of indications of criminal activity.
4. field in the TCPlIP protocol stack involves the hacker exploit known as the Ping of Death.
5. In a computer forensic investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?
Rules of evidence.
Law of probability.
Chain of custody.
Policy of separation.
6. When examining a file with a Hex Editor, what space does the file header occupy?
The last several bytes of the file.
The first several bytes of the file.
None, file header are contained in the FAT.
One byte at the beginning of the file.
7. What does the acronym POST mean as it relates to a Pc?
Primary Operations Short Test.
Power On Self Test.
Pre Operational Situation Test.
Primary Operating System Test.
8. To preserve digital evidence, an investigator should
Make two copies of each evidence item using a single imaging tool.
Make a single copy of each evidence item using an approved imaging tool.
Make two copies of each evidence item using different imaging tools.
Only store the original evidence item.
9. http stands for "hyper text transfer protocol".
True
False
10. DDoS stands for
11. What is cloning in forensic analysis?
12. What is admissible evidence?
13. Differentiate "copy of the drive" and "imaging of the drive"
14. What is Logic Bomb?
15. What is cloud forensic
16. Explain the principles of Computer -Based Evidence.
17. What are legal issues involved in seizure of the computer equipment
18. Explain any digital forensic investigation model.
19. Explain the classification of CFCC (Cyber Frand and Cyber Crime). What are the pre-search preparations required for the forensic investigation case
20. What is Intrusion Detection System How it is different from firewall
21. Write a short note on the following:
Firewall.
Hacking.
Electronic tempering.
Logic bomb.
IEEE 802.16.
2. In microsoft file structure, sectors are rounded together to form
3. The refers to handing over the results of private investigations to the authorities because of indications of criminal activity.
4. field in the TCPlIP protocol stack involves the hacker exploit known as the Ping of Death.
5. In a computer forensic investigation, what describes the route that evidence takes from the time you find it until the case is closed or goes to court?
Rules of evidence.
Law of probability.
Chain of custody.
Policy of separation.
6. When examining a file with a Hex Editor, what space does the file header occupy?
The last several bytes of the file.
The first several bytes of the file.
None, file header are contained in the FAT.
One byte at the beginning of the file.
7. What does the acronym POST mean as it relates to a Pc?
Primary Operations Short Test.
Power On Self Test.
Pre Operational Situation Test.
Primary Operating System Test.
8. To preserve digital evidence, an investigator should
Make two copies of each evidence item using a single imaging tool.
Make a single copy of each evidence item using an approved imaging tool.
Make two copies of each evidence item using different imaging tools.
Only store the original evidence item.
9. http stands for "hyper text transfer protocol".
True
False
10. DDoS stands for
11. What is cloning in forensic analysis?
12. What is admissible evidence?
13. Differentiate "copy of the drive" and "imaging of the drive"
14. What is Logic Bomb?
15. What is cloud forensic
16. Explain the principles of Computer -Based Evidence.
17. What are legal issues involved in seizure of the computer equipment
18. Explain any digital forensic investigation model.
19. Explain the classification of CFCC (Cyber Frand and Cyber Crime). What are the pre-search preparations required for the forensic investigation case
20. What is Intrusion Detection System How it is different from firewall
21. Write a short note on the following:
Firewall.
Hacking.
Electronic tempering.
Logic bomb.
IEEE 802.16.
Other Question Papers
Departments
- Centre for Corporate Education, Training & Consultancy (CCETC)
- Centre for Corporate Education, Training & Consultancy (CCETC)
- National Centre for Disability Studies (NCDS)
- School of Agriculture (SOA)
- School of Computer and Information Sciences (SOCIS)
- School of Continuing Education (SOCE)
- School of Education (SOE)
- School of Engineering & Technology (SOET)
- School of Extension and Development Studies (SOEDS)
- School of Foreign Languages (SOFL)
- School of Gender Development Studies(SOGDS)
- School of Health Science (SOHS)
- School of Humanities (SOH)
- School of Interdisciplinary and Trans-Disciplinary Studies (SOITDS)
- School of Journalism and New Media Studies (SOJNMS)
- School of Law (SOL)
- School of Management Studies (SOMS)
- School of Performing Arts and Visual Arts (SOPVA)
- School of Performing Arts and Visual Arts(SOPVA)
- School of Sciences (SOS)
- School of Social Sciences (SOSS)
- School of Social Work (SOSW)
- School of Tourism & Hospitality Service Sectoral SOMS (SOTHSM)
- School of Tourism &Hospitality Service Sectoral SOMS (SOTHSSM)
- School of Translation Studies and Training (SOTST)
- School of Vocational Education and Training (SOVET)
- Staff Training & Research in Distance Education (STRIDE)
Subjects
- Application and business Security developments
- Bcp, dr planning and audit
- Cyber security
- Digital forensics
- Introduction to Information Security
- Network security
- Policy, Standards And Laws